Topic 1
Refer to the exhibit. How is the ARP request from VM1 forwarded when VM2 is not learned in the Cisco ACI fabric?
A
Topic 1
Which approach does Cisco ACI use to achieve multidestination packet forwarding between leaf switches in the same
fabric?
C
Topic 1
What does the VXLAN source port add to the overlay packet forwarding when it uses the hash of Layer 2, Layer 3, and
Layer 4 headers of the inner packet?
A
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/vlan/212682-virtualextensible-lan-and-ethernet-
virt.html
Topic 1
Which two actions are the Cisco best practices to configure NIC teaming load balancing for Cisco
UCS B-Series blades that are connected to the Cisco ACI leaf switches? (Choose two.)
B E
Topic 1
An organization migrates its virtualized servers from a legacy environment to Cisco ACI. VM1 is incorrectly attached to
PortGroup IT|3TierApp|Web. Which action limits IP address learning in
BD1?
C
Topic 1
Refer to the exhibit. What must be configured to allow the PBR node (LB-int) to monitor the availability of the endpoint that is
in the EPG server?
A
Topic 1
An engineer must limit local and remote endpoint learning to the bridge domain subnet. Which action should be taken inside
the Cisco APIC?
B
Explanation:
Reference: https://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/ application-centric-
infrastructure/white-paper-c11-739989.html
Topic 1
What is the purpose of the Forwarding Tag (FTAG) in Cisco ACI?
D
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-x/acifundamentals/b_ACI-
Fundamentals/b_ACI-
Fundamentals_chapter_010010.html#concept_1E8BF286E1C043EF839D80935FDF9F50
Topic 1
DRAG DROP
A leaf receives unicast traffic that is destined to an unknown source, and spine proxy is enabled in the corresponding bridge
domain. Drag and drop the Cisco ACI forwarding operations from the left into the order the operation occurs on the right.
Select and Place:
Topic 1
An engineer deployed a Cisco ACI fabric and noticed that the fabric learns endpoints from subnets that are not configured on
a bridge domain. To meet strict security requirements, the engineer must prevent this behavior. Which action must be taken
to prevent this behavior?
D